Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
adware |
Adware is a type of free software supported by advertisements that show up in pop-up windows or on a toolbar on your computer or browser
|
|
back up |
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
|
|
blog |
A blog (a truncation of the expression weblog)[1] is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries ("posts").
|
|
browser |
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. |
|
computer crime |
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking and/or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams. |
|
computer ethics |
computer ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct. |
|
computer virus |
an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host. |
|
copyright |
Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. |
|
cyber bullying |
Cyberbullying is the use of technology to harass, threaten, embarrass or target another person |
|
cyber crime |
crime conducted via the Internet or some other computer network |
|
discussion board |
A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left. |
|
download |
copy (data) from one computer system to another, typically over the Internet |
|
electronic mail |
E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. |
|
encryption |
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. |
|
Ethics |
moral principles that govern a person's or group's behavior. |
|
firewall |
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. |
|
hacker |
a person who uses computers to gain unauthorized access to data. |
|
identity theft |
the deliberate use of someone else's identity
|
|
internet |
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of
|
|
local area network |
a computer network that links devices within a building or group of adjacent building
|
|
password |
a secret word or phrase that must be used to gain admission to something.a string of characters that allows access to a computer, interface, or system
|
|
social networking |
the use of dedicated websites and applications to interact with other users, or to find people with similar interests to onesel
|
|
software piracy |
Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen.
|
|
spam |
Spamming, unsolicited or undesired electronic messages
|
|
spoofing |
imitate (something) while exaggerating its characteristic features for comic effect.
|
|
spyware |
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
|
|
trojan horses |
a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
|
|
unauthorized computer access |
enacted by Congress in 1986 as an amendment to existing computer fraud law
|
|
URL |
URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. A URL has two main components: |
|
wide area network |
a computer network in which the computers connected may be far apart, generally having a radius of half a mile or more. |
|
wiki |
a free online encyclopedia, created and edited by volunteers around
|
|
world wide web |
|
|
worms |
fv |